GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-2812 SQL Injection
URL:https://github.com/sahici/CVE-2025-2812
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-2812 SQL Injection
URL:https://github.com/sahici/CVE-2025-2812
标签:#CVE-2025
GitHub
GitHub - sahici/CVE-2025-2812: CVE-2025-2812 SQL Injection
CVE-2025-2812 SQL Injection. Contribute to sahici/CVE-2025-2812 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:渗透测试
描述:Kali AI Pentest MCP tools 渗透测试工具集
URL:https://github.com/0x7556/kali_mcp
标签:#渗透测试
更新了:渗透测试
描述:Kali AI Pentest MCP tools 渗透测试工具集
URL:https://github.com/0x7556/kali_mcp
标签:#渗透测试
GitHub
GitHub - 0x7556/kali_mcp: Kali AI Pentest MCP tools 渗透测试工具集
Kali AI Pentest MCP tools 渗透测试工具集. Contribute to 0x7556/kali_mcp development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:绕过
描述:模拟键盘输入的文本粘贴,绕过学习通等网站的禁用复制粘贴检测,支持中英双语粘贴。
URL:https://github.com/Qin3Yu/PasteAssistant_v2
标签:#绕过
更新了:绕过
描述:模拟键盘输入的文本粘贴,绕过学习通等网站的禁用复制粘贴检测,支持中英双语粘贴。
URL:https://github.com/Qin3Yu/PasteAssistant_v2
标签:#绕过
GitHub
GitHub - Qin3Yu/PasteAssistant_v2: 模拟键盘输入的文本粘贴,绕过学习通等网站的禁用复制粘贴检测,支持中英双语粘贴。
模拟键盘输入的文本粘贴,绕过学习通等网站的禁用复制粘贴检测,支持中英双语粘贴。. Contribute to Qin3Yu/PasteAssistant_v2 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:A Swift exploit port of the CVE-2025-24203 iOS vulnerability by Ian Beer of Google Project Zero
URL:https://github.com/GeoSn0w/CVE-2025-24203-iOS-Exploit-in-Swift
标签:#CVE-2025
更新了:CVE-2025
描述:A Swift exploit port of the CVE-2025-24203 iOS vulnerability by Ian Beer of Google Project Zero
URL:https://github.com/GeoSn0w/CVE-2025-24203-iOS-Exploit-in-Swift
标签:#CVE-2025
GitHub
GitHub - GeoSn0w/CVE-2025-24203-iOS-Exploit-With-Error-Logging: Slightly improved exploit of the CVE-2025-24203 iOS vulnerability…
Slightly improved exploit of the CVE-2025-24203 iOS vulnerability by Ian Beer of Google Project Zero - GeoSn0w/CVE-2025-24203-iOS-Exploit-With-Error-Logging
GitHub监控消息提醒!!!
更新了:RCE
描述:Scanner web leve, rápido e modular pra caçar XSS, SQLi, RCE e mais. Feito em Python + C, com suporte a WAF bypass, multi-thread e payloads custom.
URL:https://github.com/JuaanReis/Lynx
标签:#RCE
更新了:RCE
描述:Scanner web leve, rápido e modular pra caçar XSS, SQLi, RCE e mais. Feito em Python + C, com suporte a WAF bypass, multi-thread e payloads custom.
URL:https://github.com/JuaanReis/Lynx
标签:#RCE
GitHub
GitHub - JuaanReis/Lynx: Scanner web leve, rápido e modular pra caçar XSS, SQLi, RCE e mais. Feito em Python + C, com suporte a…
Scanner web leve, rápido e modular pra caçar XSS, SQLi, RCE e mais. Feito em Python + C, com suporte a WAF bypass, multi-thread e payloads custom. - JuaanReis/Lynx
GitHub监控消息提醒!!!
更新了:RCE
描述:Describe RCE foundations and principles
URL:https://github.com/reversed-chaos-engineering/foundation
标签:#RCE
更新了:RCE
描述:Describe RCE foundations and principles
URL:https://github.com/reversed-chaos-engineering/foundation
标签:#RCE
GitHub
GitHub - reversed-chaos-engineering/foundation: Describe RCE foundations and principles
Describe RCE foundations and principles. Contribute to reversed-chaos-engineering/foundation development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-24085漏洞 和 Schemeshare漏洞
URL:https://github.com/pxx917144686/12345
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-24085漏洞 和 Schemeshare漏洞
URL:https://github.com/pxx917144686/12345
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:RCE
描述:Repositório para a Análise de Dados do projeto RCEPRS.
URL:https://github.com/mariaeduardabe/RCEPRS
标签:#RCE
更新了:RCE
描述:Repositório para a Análise de Dados do projeto RCEPRS.
URL:https://github.com/mariaeduardabe/RCEPRS
标签:#RCE
GitHub
GitHub - mariaeduardabe/RCEPRS: Repositório para a Análise de Dados do projeto RCEPRS.
Repositório para a Análise de Dados do projeto RCEPRS. - GitHub - mariaeduardabe/RCEPRS: Repositório para a Análise de Dados do projeto RCEPRS.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:Basic customization app using CVE-2025-24203. Patched in iOS 18.4.
URL:https://github.com/vigilante-1337/CVE-2025-3248
标签:#CVE-2025
更新了:CVE-2025
描述:Basic customization app using CVE-2025-24203. Patched in iOS 18.4.
URL:https://github.com/vigilante-1337/CVE-2025-3248
标签:#CVE-2025
GitHub
GitHub - vigilante-1337/CVE-2025-3248: CVE-2025-3248: A critical flaw has been discovered in Langflow that allows malicious actors…
CVE-2025-3248: A critical flaw has been discovered in Langflow that allows malicious actors to execute arbitrary Python code on the target system. This can lead to full remote code execution withou...
GitHub监控消息提醒!!!
更新了:RCE
描述:A Python-based static vulnerability scanner for PHP files that detects common issues like XSS, SQLi, and RCE
URL:https://github.com/SrLiath/vuln-scan
标签:#RCE
更新了:RCE
描述:A Python-based static vulnerability scanner for PHP files that detects common issues like XSS, SQLi, and RCE
URL:https://github.com/SrLiath/vuln-scan
标签:#RCE
GitHub
GitHub - SrLiath/vuln-scan: A Python-based static vulnerability scanner for PHP files that detects common issues like XSS, SQLi…
A Python-based static vulnerability scanner for PHP files that detects common issues like XSS, SQLi, and RCE - SrLiath/vuln-scan
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC for RCE vulnerability in cloudflare/workers-sdk
URL:https://github.com/UnknownAirtist/rce-poc-workers-sdk
标签:#RCE
更新了:RCE
描述:PoC for RCE vulnerability in cloudflare/workers-sdk
URL:https://github.com/UnknownAirtist/rce-poc-workers-sdk
标签:#RCE
GitHub
unkn0wn-artist/rce-poc-workers-sdk
PoC for RCE vulnerability in cloudflare/workers-sdk - unkn0wn-artist/rce-poc-workers-sdk
GitHub监控消息提醒!!!
更新了:渗透测试
描述:渗透测试报告生成工具 - 自动化生成专业渗透测试报告
URL:https://github.com/ifraise/PenTestReportGen
标签:#渗透测试
更新了:渗透测试
描述:渗透测试报告生成工具 - 自动化生成专业渗透测试报告
URL:https://github.com/ifraise/PenTestReportGen
标签:#渗透测试
GitHub
GitHub - ifraise/PenTestReportGen: 渗透测试报告生成工具 - 自动化生成专业渗透测试报告
渗透测试报告生成工具 - 自动化生成专业渗透测试报告. Contribute to ifraise/PenTestReportGen development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:信息收集
描述:subfinder-x是一款高性能的子域名爆破工具,使用 Go 语言开发,专为信息收集和渗透测试场景设计。该工具能够快速发现目标域名的子域名,并支持多级子域名扫描、HTTP服务识别和指纹识别等功能。
URL:https://github.com/kk12-30/subfinder-x
标签:#信息收集
更新了:信息收集
描述:subfinder-x是一款高性能的子域名爆破工具,使用 Go 语言开发,专为信息收集和渗透测试场景设计。该工具能够快速发现目标域名的子域名,并支持多级子域名扫描、HTTP服务识别和指纹识别等功能。
URL:https://github.com/kk12-30/subfinder-x
标签:#信息收集
GitHub
GitHub - kk12-30/subfinder-x: subfinder-x是一款高性能的子域名爆破工具,使用 Go 语言开发,专为信息收集和渗透测试场景设计。该工具能够快速发现目标域名的子域名,并支持多级子域名扫描、HTTP服务识别和指纹识别等功能。
subfinder-x是一款高性能的子域名爆破工具,使用 Go 语言开发,专为信息收集和渗透测试场景设计。该工具能够快速发现目标域名的子域名,并支持多级子域名扫描、HTTP服务识别和指纹识别等功能。 - kk12-30/subfinder-x
GitHub监控消息提醒!!!
更新了:信息收集
描述:基于Vibe Coding理念开发(Cursor 与 Claude 3.7),实现高效深度研究和信息收集的Agent。
URL:https://github.com/libxee/vibe-researcher
标签:#信息收集
更新了:信息收集
描述:基于Vibe Coding理念开发(Cursor 与 Claude 3.7),实现高效深度研究和信息收集的Agent。
URL:https://github.com/libxee/vibe-researcher
标签:#信息收集
GitHub
GitHub - libxee/vibe-researcher: 基于Vibe Coding理念开发(Cursor 与 Claude 3.7),实现高效深度研究和信息收集的Agent。
基于Vibe Coding理念开发(Cursor 与 Claude 3.7),实现高效深度研究和信息收集的Agent。 - libxee/vibe-researcher
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32407 PoC
URL:https://github.com/diegovargasj/CVE-2025-32407
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32407 PoC
URL:https://github.com/diegovargasj/CVE-2025-32407
标签:#CVE-2025
GitHub
GitHub - diegovargasj/CVE-2025-32407: CVE-2025-32407 PoC
CVE-2025-32407 PoC. Contribute to diegovargasj/CVE-2025-32407 development by creating an account on GitHub.
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-32756 — Fortinet FortiVoice Unauthenticated RCE (PoC)
URL:https://github.com/m4s1um/CVE-2025-32756-RCE-PoC
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-32756 — Fortinet FortiVoice Unauthenticated RCE (PoC)
URL:https://github.com/m4s1um/CVE-2025-32756-RCE-PoC
标签:#CVE-2025
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:CVE-2025-4094 – WordPress Digits Plugin < 8.4.6.1 - OTP Authentication Bypass
URL:https://github.com/starawneh/CVE-2025-4094
标签:#CVE-2025
更新了:CVE-2025
描述:CVE-2025-4094 – WordPress Digits Plugin < 8.4.6.1 - OTP Authentication Bypass
URL:https://github.com/starawneh/CVE-2025-4094
标签:#CVE-2025
GitHub
GitHub - starawneh/CVE-2025-4094: CVE-2025-4094 – WordPress Digits Plugin < 8.4.6.1 - OTP Authentication Bypass
CVE-2025-4094 – WordPress Digits Plugin < 8.4.6.1 - OTP Authentication Bypass - starawneh/CVE-2025-4094
GitHub监控消息提醒!!!
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/pilgrimage233/Minecraft-Rcon-Manage
标签:#护网
更新了:护网
描述:Node.js+Playwright服务器,通过模拟 OpenAI API 的方式来访问 Google AI Studio 网页版,服务器无缝交互转发gemini模型对话。这使得兼容 OpenAI API 的客户端(如 Open WebUI, NextChat 等)可以使用 AI Studio 的无限额度及能力。经测试因无法绕过自动化检测故暂不支持无头模式启动实例-自用项目随缘维护
URL:https://github.com/pilgrimage233/Minecraft-Rcon-Manage
标签:#护网
GitHub
GitHub - pilgrimage233/Minecraft-Rcon-Manage: 🔥 全新开源!专为Minecraft服务器主打造的全能管理方案,基于RuoYi-Vue框架开发,三大核心功能助力高效运维: ✨ 核心亮点: ✅ 多服务器统一仪表盘…
🔥 全新开源!专为Minecraft服务器主打造的全能管理方案,基于RuoYi-Vue框架开发,三大核心功能助力高效运维: ✨ 核心亮点: ✅ 多服务器统一仪表盘 - 实时状态/在线玩家/远程指令一站式管理 ✅ 智能白名单系统 - 正版验证+自动审核+邮件通知+IP防护 ✅ 全维度玩家管理 - 游戏行为追踪/时长统计/地理分布/封禁系统 💻 进阶功能: RCON远程控制 + 网页版终端 OP...
GitHub监控消息提醒!!!
更新了:CVE-2025
描述:PoC para o CVE-2025-24813
URL:https://github.com/maliqto/PoC-CVE-2025-24813
标签:#CVE-2025
更新了:CVE-2025
描述:PoC para o CVE-2025-24813
URL:https://github.com/maliqto/PoC-CVE-2025-24813
标签:#CVE-2025
GitHub
GitHub - maliqto/PoC-CVE-2025-24813: PoC para o CVE-2025-24813
PoC para o CVE-2025-24813. Contribute to maliqto/PoC-CVE-2025-24813 development by creating an account on GitHub.